Sharing of thoughts and information is what blogging is all about. This way we can learn from each other. Post A Comment!These postings are provided "AS IS" with no warranties, and confers no rights. You assume all risk for your use.
Anthony Bartolo Twitter | LinkedIn
Pierre Roman Twitter | LinkedIn
A while back Anthony Bartolo wrote on this site about the Enterprise Enhancements For Windows 8.1 there were a lot of information in that post regarding the following points:
Following that post I wrote about the steps you need to setup and manage the “Boot directly to the Desktop in Windows 8.1 Preview”. That post generated a lot of side conversation regarding the difference between a registry hack and managed way of doing things. But it also started a conversation on LinkedIn where it was asked if we could dive a little deeper in the security enhancements of Windows 8.1 for enterprise.
So here goes…
Here are the areas in Windows 8.1 where we made significant improvements.
These three areas sitting on top of Trustworthy Hardware.
Let’s dive in each of these areas.
According to the Microsoft Security Intelligence Report, Volume 14, July through December, 2012
Running Unprotected: Measuring the Benefits of Real-Time Security Software,
If you are running Windows 8 or Windows 8.1, you are approximately 6 times less likely to be infected to be infected by malware then if you were running Windows 7. 21 times less likely to be infected then if you are running Windows XP (which will no longer be supported after April 2014).
In the real world just like in cyber world there are 2 type of change
As security threats continue to evolve, we evolves our countermeasure. Bad find a security hole to exploit, we patch the hole. They develop a new method we develop protection for that new method….. Wash, rinse, repeat. Still… We invest in our built-in malware protection.
We’ve also put a lot of thought into how businesses can protect their data even when it resides on employees’ personal devices.
With Windows 8.1, we’ve focused a lot of attention on the controls that IT departments can place on devices to restrict who can physically access a device.
Often in a BYOD scenario, if an employee buys a new computer, it can be hit-or-miss as to whether the device will have all the tools baked in that an IT department needs to make sure any data on that device is secure. With Windows 8.1 we take away the guesswork.
keep in mind that these improvements are in addition to all the ones we discussed in a post back in may called Windows 8: More beautiful, more flexible and more secure
in the coming weeks I’ll dive into each of these improvements and look at how we implement those in an enterprise settings.
let’s keep the conversation going. it’s the only way we learn.
Pierre Roman, MCITP, ITIL | IT Pro Advisor Twitter | Facebook | LinkedIn